找回密碼
 To register

QQ登錄

只需一步,快速開始

掃一掃,訪問微社區(qū)

打印 上一主題 下一主題

Titlebook: Computer Security -- ESORICS 2009; 14th European Sympos Michael Backes,Peng Ning Conference proceedings 2009 Springer-Verlag Berlin Heidelb

[復(fù)制鏈接]
樓主: 尖酸好
11#
發(fā)表于 2025-3-23 12:15:41 | 只看該作者
https://doi.org/10.1007/978-981-10-7632-9t regulations (e.g., the Sarbanes-Oxley act and the Securities and Exchange Commission rule) mandate secure retention of important business records for several years. We provide a mechanism to authenticate bulk repositories of archived documents. In our approach, a space efficient local data structu
12#
發(fā)表于 2025-3-23 17:54:41 | 只看該作者
Homocysteine in Occlusive Vascular Diseaseous methods are all limited in analyzing only plain-text communications wherein the exchanged messages are not encrypted. In this paper, we propose ReFormat, a system that aims at deriving the message format even when the message is encrypted. Our approach is based on the observation that an encrypt
13#
發(fā)表于 2025-3-23 19:50:58 | 只看該作者
14#
發(fā)表于 2025-3-24 01:32:19 | 只看該作者
15#
發(fā)表于 2025-3-24 02:48:11 | 只看該作者
16#
發(fā)表于 2025-3-24 06:53:48 | 只看該作者
User-Centric Handling of Identity Agent Compromisefor users. We believe that an identity management system (IdMS) that empowers users to become aware of how and when their identity credentials are used is critical for the success of such online services. Furthermore, rapid revocation and recovery of potentially compromised credentials is desirable.
17#
發(fā)表于 2025-3-24 14:00:59 | 只看該作者
The Coremelt Attackt the victim host against undesired traffic..We present Coremelt, a new attack mechanism, where attackers only send traffic between each other, and not towards a victim host. As a result, none of the attack traffic is unwanted. The Coremelt attack is powerful because among . attackers, there are .(.
18#
發(fā)表于 2025-3-24 17:16:30 | 只看該作者
Lightweight Opportunistic Tunneling (LOT)ld automatically and securely establish efficient tunnel, encapsulating packets sent between them. This allows . to discard packets which use .’s network addresses but were not sent via . (i.e. are spoofed) and vice verse..LOT is practical: it is easy to manage (‘plug and play’, no coordination betw
19#
發(fā)表于 2025-3-24 21:18:10 | 只看該作者
Hide and Seek in Time — Robust Covert Timing Channelsrk communication. Previous results used encoding mechanisms that are either easy to detect with statistical analysis, thus spoiling the purpose of a covert channel, and/or are highly sensitive to channel noise, rendering them useless in practice. In this paper, we introduce a novel covert timing cha
20#
發(fā)表于 2025-3-25 02:53:21 | 只看該作者
 關(guān)于派博傳思  派博傳思旗下網(wǎng)站  友情鏈接
派博傳思介紹 公司地理位置 論文服務(wù)流程 影響因子官網(wǎng) 吾愛論文網(wǎng) 大講堂 北京大學(xué) Oxford Uni. Harvard Uni.
發(fā)展歷史沿革 期刊點(diǎn)評(píng) 投稿經(jīng)驗(yàn)總結(jié) SCIENCEGARD IMPACTFACTOR 派博系數(shù) 清華大學(xué) Yale Uni. Stanford Uni.
QQ|Archiver|手機(jī)版|小黑屋| 派博傳思國(guó)際 ( 京公網(wǎng)安備110108008328) GMT+8, 2025-10-7 14:48
Copyright © 2001-2015 派博傳思   京公網(wǎng)安備110108008328 版權(quán)所有 All rights reserved
快速回復(fù) 返回頂部 返回列表
铁力市| 镇巴县| 淮安市| 华池县| 赤水市| 平凉市| 栾城县| 鞍山市| 手游| 山丹县| 商都县| 淮滨县| 阿瓦提县| 涿鹿县| 汝阳县| 新安县| 绍兴市| 邻水| 克东县| 双峰县| 涟源市| 周宁县| 营口市| 台中县| 双柏县| 麻栗坡县| 中方县| 稷山县| 新疆| 万盛区| 广汉市| 隆林| 保康县| 延吉市| 凤城市| 鹿邑县| 洛浦县| 台中市| 五峰| 建湖县| 秀山|